期刊文献+

一种基于区块链和边缘计算的物联网方案 被引量:1

A solution for internet of things based on blockchain and edge computing
下载PDF
导出
摘要 物联网设备资源受限,需要使用外部资源,而集中式的云方案恰好可以为物联网提供充足的计算存储资源.但是受制于网络带宽等因素,云不能及时地处理大量的数据.云方案采用静态密码的验证和明文存储的机制,也存在着安全性问题.区块链技术的兴起,为解决物联网安全问题带来了新思路.边缘计算缩短了数据处理距离,增强了实时性.因此,本文将使用这两项技术,解决目前物联网中的问题. The resource of the internet of things(IoT) devices is limited and external resources are needed.While a centralized cloud solution can provide sufficient computing and storage resources for the internet of things.However,the cloud cannot process large amounts of data promptly,due to some factors such as network bandwidth.The scheme based on cloud uses static password authentication and plaintext storage mechanism,thus there are some security problems.The emerging technology of blockchain brings a new idea to solve the security problems of the internet of things.And edge computing shortens the distance of data processing and enhances the real-time performance.Therefore,this paper will use these two technologies to solve the current problems in the internet of things.
作者 刘帅 戚荣鑫 董昳晖 冯孟 苗田田 蒋玲红 LIU Shuai;QI Rongxin;DONG Yihui;FENG Meng;MIAO Tiantian;JIANG Linghong(School of Computer&Software,Nanjing University of Information Science&Technology,Nanjing 210044;Cyberspace Security Research Center,Pengcheng Laboratory,Shenzhen 518000;State Key Laboratory of Cryptology,Beijing 100878)
出处 《南京信息工程大学学报(自然科学版)》 CAS 2019年第5期596-600,I0016,共6页 Journal of Nanjing University of Information Science & Technology(Natural Science Edition)
基金 国家自然科学基金(61922045,U1836115,61672295) 江苏省自然科学基金(BK20181408) 密码科学技术国家重点实验室项目(MMKFKT201830) 网络与交换技术国家重点实验室(北京邮电大学)开放课题(SKLNST-2019-2-02) 鹏城实验室网络空间安全研究中心(PCL2018KP004)
关键词 区块链 物联网 边缘计算 安全 blockchain internet of things(IoT) edge computing security
  • 相关文献

参考文献1

二级参考文献13

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008.
  • 4SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010.
  • 5LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010.
  • 6XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010.
  • 7Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987.
  • 8BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973.
  • 9LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992.
  • 10BIBA K J.Integrity Considerations for Secure Computer Systems[R].Bedford:ESD-TR-76-732,1977.

共引文献68

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部